Review Article

Classification and Analysis of Security Techniques for the User Terminal Area in the Internet Banking Service

Table 8

A summary of security techniques for the user terminal area in the Internet banking service.

Security techniquesKey strengthWeakness

Secure keyboard programPrevents exposure of important information input from usersIt is difficult to implement and has race condition between attacker and defender

PKI applicationsPrevents the exposure of important information transmitted to the network domainRequires PKI module implementation and deployment costs

E2E encryptionPrevents the exposure of important information transmitted from the user terminal domain to the financial institution domainRequires E2E module implementation and deployment costs

Antihacking programProtects the system by preventing and detecting attacks from the outside in the user terminal domainIt is impossible to completely protect the system, and it is difficult to detect unknown attacks, due to various system attacks

Personal firewallProtects the system by detecting and blocking malicious packets in the network domainIt is impossible to completely protect the system, and it is difficult to detect unknown attacks, due to the variety of network attacks

Removable media securityEnhances the security of user authentication by protecting personal and confidential information such as certificates stored on removable mediaIt is difficult to completely protect stored important information by bypassing authentication and exposing the cryptography key, due to various vulnerabilities

Antireverse engineering techniqueProtects program code by making it difficult for attackers to analyze the program and taking a long time for analysisIt is difficult to completely protect the analysis of the program code; finally, there is a drawback and weakness in that it can be analyzed, even if it takes a long time